[1] 杨银国, 林舜江, 欧阳逸风, 刘明波. 三级电压控制体系下大电网暂态电压安全仿真及其控制策略[J]. 电网技术, 2013, 37(0): 1-7.
Yang Yinguo, Lin Shunjiang, Ouyang Yifeng, Liu Mingbo. Simulation of transient voltage security of large-scale power grid under three-level voltage control system and its control strategy[J]. Power System Technology, 2013, 37(0): 1-7.
[2] 林舜江, 刘明波. 暂态电压安全预防控制优化的轨迹灵敏度法[J]. 电力系统自动化, 2010, 34(4): 12-17.
Lin Shunjiang, Liu Mingbo. Using trajectory sensitivity method for transient voltage security preventive control optimization[J]. Automation of Electric Power Systems, 2010, 34(4): 12-17.
[3] Hua Bai and Venkataramana Ajjarapu. A novel online load shedding strategy for mitigating fault-induced delayed voltage recovery[J]. IEEE Transactions on Power Systems, 2011, 26(1): 294-304.
[4] Enrico De Tuglie, Maria Dicorato, Massimo La Scala and Pierangelo Scarpellini. A corrective control for angle and voltage stability enhancement on the transient time-scale[J]. IEEE Transactions on Power Systems, 2000, 15(4): 1345-1353.
[5] Luis S. Vargas and Claudio A. Time dependence of controls to avoid voltage collapse[J]. IEEE Transactions on Power Systems, 2000, 15(4): 1367-1375.
[6] Sandro Corsi, Massimo Pozzi, Carlo Sabelli and Antonio Serrani. The coordinated automatic voltage control of the Italian transmission grid-Part I: Reasons of the choice and overview of the consolidated hierarchical system[J]. IEEE Transactions on Power Systems, 2004.
[7] 刘明波, 高强, 林舜江, 潮铸.考虑暂态电压稳定的二级电压紧急控制[J].华南理工大学学报, 2011, 39(8): 133-150.
Liu Ming-bo, Gao Qiang, Lin Shun-jiang, Chao Zhu. Secondary voltage emergency control considering transient voltage stability[J]. Journal of South China University of Technology, 2011, 39(8): 133-150.
[8] Xingyi Zhang, Ye Tian, Ran Cheng, and Yaochu Jin. An efficient approach to non-dominated sorting for evolutionary multi-objective optimization[J]. IEEE Transactions on Evolutionary Computation, 2014: in press.
[9] Indraneel Das, J.E.Dennis. Normal-boundary intersection: a new method for generating the Pareto surface in nonlinear multicriteria optimization problems[J]. SIAM Journal on Optimization, 1998, 8: 631-657.
[10] Messac, A.Ismail-Yahaya, C.Mattson. The normalized normal constraint method for generating the Pareto frontier[J], Structural and Multidisciplinary Optimization, 2003,25: 86-98.
[11] 吴浩, 郭瑞鹏, 韩祯祥. 电力系统微分代数模型的奇异性和暂态电压稳定[J]. 电力系统自动化, 2006, 30(13): 16-21.
Wu Hao, Guo Ruipeng, Han Zhenxiang. Relationship between transient voltage stability and singularity in power system differential algebraic model[J]. Automation of Electric Power Systems, 2006, 30(13): 16-21.
[12] H. L. Liao and Q. H. Wu. Multi-Objective optimisation by reinforcement learning[C]. IEEE Congress on Evolutionary Computation. [v.4].2010: 2600-2607.
[13] Ramtin Hadidi and Benjamin Jeyasurya. Reinforcement learning approach for controlling power system stabilizers[J]. Can.J.Elect.Comput.Eng, 2009, 34(3): 99-103.
[14] Ramtin Hadidi and Benjamin Jeyasurya. Reinforcement learning based real-time wide-area stabilizing control agents to enhance power system stability[J]. IEEE Transactions on Power Systems, 2013, 4(1): 489-497.
[15] 余涛, 甄卫国. 基于多步回溯Q(λ)的PSS最优控制方法的研究[J]. 电力系统保护与控制, 2011, 39(3): 18-28.
Yu Tao, Zhen Weiguo. Optimal control method of PSS based on multi-step backtrack Q(λ) learning[J]. Power System Protection and Control, 2011, 39(3): 18-28.
[16] 李婷, 刘明波. 求解多目标协调二级电压控制的简化强化学习方法[J]. 中国电机工程学报, 2013, 33(31): 130-139.
Li Ting, Liu Mingbo. Reduced reinforcement learning method
applied to multi-objective coordinated secondary voltage control[J]. Proceedings of the CSEE, 2013, 33(31): 130-139.
[17] 赵昀, 陈庆伟. 有关强化学习的若干问题研究[D]. 江苏, 南京理工大学, 2009.
Zhao Yun, Chen Qingwei. Research on several issues related to reinforcement learning[D]. Jiangsu, Nanjing University of Science and Technology, 2009.
[18] GAMS Development Corporation.GAMS, the solver Manuals[B/OL]. http://www.gams.com/solvers/index.htm, Washington: GAMS Development Corporation, 2011.
[19] Deb K, Pratap A, Agarwal S, et al.A fast and elitist multiobjective genetic algorithm: NSGA-II[J].IEEE Transactions on Evolutionary Computation, 2002, 6(2): 182-197.
|